IP Networks
Metro / MPLS. Metropolitan Networks
The Service Provider is providing customers with Internet access. The customers are running business from several remote offices. These remote offices need to be securely connected into a Layer 2 or a Layer 3 network. The Service Provider is providing similar services for different clients. All of them need their VPN networks to be completely separated. Clients can also be assigned with overlapping IP address space. The solution should be scalable enough to meet a possible further increase in numbers of customers.
Read moreSwitching and Routing
A Local Area Network is the basic unit of any computer network. Its design depends on the users' needs, the requirements of the applications being used and the characteristics of the building where the LAN is to be deployed. Other factors to be taken into account when designing a Local Area Network are the necessary level of security, the complexity of the services being integrated and maintenance costs.
Read moreWireless Access
Scaling to meet the needs from the smallest office to the largest enterprise network, Iskra can provide a comprehensive enterprise Wireless LAN (WLAN) solution for the widest range of mobility requirements.
Read moreIP Telephony
IP telephony or VoIP (Voice over IP) is a term defining voice transfer over the Internet Protocol (IP). Integrating VoIP with the IP network enables new voice services not just for the end user but also for the network systems. Further more, with VoIP any changes are easier to implement.
Read moreIP Video / IPTV
IPTV (Internet Protocol Television) is a system where digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through technologies used for computer networks.
Read moreIP Security
The enormous expansion of communication technologies and instant access to information over Internet made network security an important or even the most important network quality. A normal firewall in a network and between the networks does not suffice for traffic control and traffic limiting anymore. Demand for better network security brought with it new security appliances and new security tools. Further more, as the number of security related appliances grew, the need to consolidate a number of devices and tools into a single appliance has become apparent and thus Unified Threat Management (UTM) firewalls were born.
Read more